Security researchers from Websense have intercepted a currently circulating spam campaign, impersonating popular antivirus vendors in an attempt to trick end and corporate users into downloading and executing the malicious attachment.
According to Websense, the campaign is low-volume, and is currently impersonating Symantec, F-Secure, Verisign and Sophos.
The malicious payload (MD5: ebb4ac5bb30b93e38a02683e3e7c98c6) is currently detected by 3 out of 42 antivirus scanners as Trojan.Agent/Gen-Banload; TROJ_GEN.R47H1HR.
Upon successful execution, the sample phones back to hxxp://bluemountain-ecards.net/images/loader.php (126.96.36.199), hxxp://asselegis.org.br/images/txt.txt (188.8.131.52), hxxp://basketcoach.com/images/logos/Plugin.dll (184.108.40.206).
Users are advised to avoid interacting with the emails, and to consider reporting them as spam as soon as they come across them.
Find out more about Dancho Danchev at his LinkedIn profile.